https://invisiblesecurity.blogspot.com/ https://knowledgeanitivirus.blogspot.com/ https://easydatasolutionshere.blogspot.com/ https://anitvirusecurity.blogspot.com/ https://letstechtalkwithus.blogspot.com/ https://computersecuritygossip.blogspot.com/ https://computersecurityinformations.blogspot.com https://computersecurityreviews.blogspot.com/ Techie- Tech

Wednesday, May 12, 2021

Online Phishing Scams : Total Security Software Protecting PCs & You

 Online Phishing Scams : Total Security Software

Protecting PCs & You



Online fraudsters are increasingly trying to obtain personal data such as addresses, dates of birth, passwords, bank details, or credit card numbers. To do this, the criminals contact potential victims by phone or email. The scam is called phishing - an artificial word made up of the terms password and fishing. Stolen data is often resold to other fraudsters, and bank details and credit card numbers are used for purchases on behalf of the victims. The market presents common phishing tricks and tips on how consumers can protect themselves.


Email Phishing: What Scammers Do


The perpetrators often obtained the email addresses of potential victims through address dealers. They often send potential victims manipulated file attachments or links which, after clicking, install undetected spy programs on the computer or lead to fake websites of well-known companies, for example from a bank or government agency, and recently also from streaming services such as Netflix and Maxdome. For example, on the fake pages, potential victims are asked to enter their login details.


Protection Against Phishing Emails


These precautionary measures can protect against phishing scammers:

  • Be suspicious of email senders you don't Know. But e-mails from known senders can also be manipulated - if the Senders themselves have been victims of a phishing attack.
  • Don't let yourself be put under time Pressure.
  • Do not click links from unknown senders.
  • Do not open attachments from unknown Senders.
  • Do not carelessly give out personal information such as dates of birth, addresses, and bank details.
  • Do not react to suspicious e-mails, for example with a reply.
  • Government institutions, banks, Financial service providers, airlines, or online shops never ask their Customers to change their login details or account details without being Asked. If in doubt, call the company the email is said to have come from.

Detect Suspicious Emails


In more and more cases, fake emails can hardly be distinguished from real emails. Indications of a forgery are for example

  • Missing personal address
  • Misspellings, strange sentence Structure, poor writing style
  • Threats
  • Request to enter personal data
  • Request to click attachments or links
  • Unsolicited mail in English
  • Companies unknown to you
  • Companies you know who have never Contacted you by email before

Phishing by Phone: How Scammers Go About It


Phishing by phone often comes from professionally equipped, illegal call centers that are based abroad. Trained employees work on the telephones and have plausible answers to every objection from the person called. They pretend to be employees of large companies such as Microsoft, Apple, Sparkassen, Netflix, competition providers, or PayPal. State authorities such as public prosecutors or tax offices are also simulated. The fraudsters put the called under pressure and induce them to make quick decisions. Either to avert a supposedly greater evil. Or to get supposedly big financial gains.


Protection Against Phishing by Phone


These measures can protect against phishing attacks over the phone:

  • Do not sign in by name.
  • Answer in full sentences. Don't Answer questions with "yes".
  • Don't let yourself be pressured.
  • Never give personal details such as bank Details on the phone!
  • Obtain written documents before Transferring money.
  • If you receive multiple calls: block the telephone number on your telephone.
  • If you have been taken by surprise and accepted an offer, cancel in writing and contact your bank to stop approved payments. Report it to the police.

 Install Protegent360's total security to minimize the chance of phishing attacks

 

Making Computer Usage Most Secure Using Best Antivirus Software

 Making Computer Usage Most Secure Using 

Best Antivirus Software




Windows is the most successfully attacked of all operating systems, on the one hand, because of its spread and on the other hand also because of its fundamental uncertainty lies. In this article, I would like to list and explain some measures with which Windows can be secured or used safely as far as possible. The post will be continuously updated when new measures are required, so you are welcome to bookmark it so that you can access it again quickly. The links in the article refer to earlier articles that shed light on the respective topic.

Antivirus Software

The most obvious protective measure for Windows is to install antivirus software. Most manufacturers offer at least three basic variants: a free version, a paid virus scanner, and a suite with various additional functions such as firewalls, browser plugins, etc.

One cannot make a basic recommendation as to which variant is preferable and which manufacturer offers the most powerful program. Current test reports incompetent specialist magazines should be used to make a decision. My overall opinion is:

·    In most cases, the free version is sufficient. The free versions of most programs receive signature updates less often (only once a day instead of, for example, every hour), but signatures are becoming less and less important. Nowadays, malware is only actively distributed for a few hours. It can take days, if not weeks, for the manufacturer of the anti-virus software to receive a sample of the malware, create a signature, and distribute it to the programs. Likely, the signature is already out of date, regardless of the update frequency with which it was distributed.


The two other important protective mechanisms of heuristics and behavioral recognition are increasingly being expanded in the free programs. Make sure that the free version also offers these two functionalities.

 

·       If you do want to purchase protection software, it is usually sufficient to buy a virus scanner. This may be updated more frequently and may contain more sophisticated heuristics and behavioral detection. This may give you a little more security.

 

·       I usually don't see a good reason to buy a suit that usually includes a personal firewall, browser plugins, and other additional programs. The browser plugins often work poorly, load the browser, and have little to no use. Personal firewalls are no more useful than the firewall already built into Windows, but very often confuse the user with messages that he does not understand.

 

Regardless of which variant you choose, you need to familiarize yourself with the messages of the program and its settings so that you can understand warnings and differentiate them from fake messages in the browser. If you don't know what a virus alert from your program looks like, it's easy to fall for a fake alert such as B. was placed as advertising on a website.

You should also set regular system scans and not just rely on the live scanner checking the currently open data.

In the case of a legitimate report: keep calm. If the program has found malware on a website or in the attachment to an email and reports it, then everything is fine. There is no need to panic. The system has been protected, it has not been infected.

If an infection succeeds, your virus scanner will usually not respond initially. Only when he is later able to recognize the infection through an update can he report, for example during a full system scan. He will then also offer suggested solutions, such as moving files to quarantine or deleting them. In any case, you should first google for the reported pest and find out what it does and how it can be eliminated.

Linux-based bootable DVDs or USB sticks can be very helpful, with which you start the computer instead of Windows and which use one or more virus scanners to check that Windows is not running. Since Windows is not running, the malicious programs are not active either, making them easier to identify and remove.

Settings in Windows Itself

Windows itself is not optimally configured in all cases and can also be adjusted too easily. Sensible safety functions are often switched off for convenience, for example.

The most important setting that you can and should change yourself is showing the file extensions. The article linked here explains how to do this. The fact that Windows hides known file extensions by default and thus unnecessarily obscures the type of a file is one of the main causes of successful malware infections that require user cooperation to install it.

User account control (also called UAC) is the program that reports to users with administrative rights as soon as they try to do something that Windows understands as an administrative action. Usually, you have to confirm a dialog with OK. Under no circumstances should you turn off User Account Control or lower its sensitivity. Do not get used to the Windows reflex (or get used to it again in a hurry) that leads to pressing OK on-screen messages without even trying to read and understand the message. If you don't understand a message, and especially if you don't expect to get one, "OK" is exactly the wrong answer.

Make sure that the Windows firewall is active unless you have bought a suite with your own firewall. You should also check other security settings regularly; the Windows Action Center will point out problems. Do not ignore these messages. You should also not ignore updated messages from Windows or other programs. Updates are important.

A system program that is unnecessary in many cases, but which can be used very well for attacks via scripts in e-mail attachments, is the Windows Script Host. For example, JavaScript normally only runs in the browser. However, if such a script is attached to an e-mail, a double-click on the script file starts the Windows Script Host, which then executes the script independently of the browser. The script can then reload malicious code from the Internet without having to use the browser.

For the vast majority of Windows users, this program is of no use and should therefore be deactivated.

Backups

Backing up your data on separate data carriers that are not permanently connected to the computer is life insurance for your data. You can defuse two threats in this way: sudden hard drive death, in which the hard drive itself simply gives up the ghost, and blackmail trojans, which encrypt your data and only release it again for a ransom.

 

The right backup strategy consists of a simple method of data protection that you can fully survey and understand and that will still be available to you in an emergency even months and years later. Backup software can be helpful, but too often I see that how it works is not understood, its error messages are not read, etc. A backup that did not take place or that cannot be restored is pointless. A simple manual copy of the data that is repeated regularly is often the easiest and most useful alternative.

 

Review your backup strategy regularly and don't let it slip.

Set up User Accounts Sensibly

One important measure that is unfortunately ignored by the vast majority of Windows users is to use different accounts for users. Most Windows installations only have a single user account, and this has administrative rights and does not have or require a password.

Until Windows XP, due to the limitations of the system and the lack of specifications for programmers, it was almost impossible to use it without an administrator account. However, since Vista, the situation has improved in this regard.

In a properly secured Windows installation, there should therefore be one or, if necessary, several accounts with administrative rights, but these should only be used for administrative tasks such as updates and software installation. For daily work, surfing, etc., there should be a separate user account for each computer user, which only has limited rights. If malware tries to establish itself on the computer while a restricted user account is active, this malware also only has limited options for the user. That may be enough for a blackmail trojan, but many malware methods to anchor themselves deep in the system then fail.

When a restricted user wants to perform an administrative task, Windows usually display a dialog in which the password of an administrative user must be entered to carry out the action. If such a dialog appears without an appropriate action having been started, you know that you should close this dialog and not enter the password.

The separation of users also has the pleasant side effect that browser histories, cookies, password managers, and many settings are available individually and only for the current user.

Source of Danger Browser

The browser is the program you use to view web pages. It is the window into the Internet and also the window through which a large part of the malware tries to penetrate. Browsers are therefore one of the programs that you should definitely keep up to date.

Internet Explorer is a special case because it is equipped with techniques that make it a particularly high-security risk. Don't use it. In particular, you should no longer use a version before Internet Explorer 11, as Microsoft no longer maintains it. Version 11 is said to be the last version of this browser, with which technologies like Active X, some of which have greater rights in the system than even administrators, are finally being buried. The Edge browser available in Windows 10 is not a cause for concern in this regard, even if it does not yet represent any serious competitor to Chrome or Firefox.

 

Using browsers other than Microsoft's is already an advantage in terms of speed and security. With extensions such as ad blockers, JavaScript blockers, etc. can also be provided here for additional security. Firefox also has the advantage of its own certificate management, which is not impressive if Windows are slipped with fake security certificates.

 

My personal recommendation is Firefox with the extensions AdBlockPlus and NoScript, although NoScript, in particular, has to be set correctly in order not to hinder the surfing experience in the long term.

Handling Emails

E-mails are currently being used again to a particularly large extent to distribute malware. You can't trust emails in principle. Aside from phishing attempts, there is a risk primarily from e-mail attachments that pretend to be a document, but in reality, are malware that tries to download malware from the Internet and install it on the system.

Don't trust email attachments. Don't believe emails asking you to pay, logging in to check security settings, etc., and the like. In the Security category of this page, you will find numerous examples of such emails, as well as in the Dangerous Emails gallery.

Avoiding Unsafe Software

Last but not least, as far as possible, you should avoid using software that is particularly exposed to the crossfire of attacks. The list isn't particularly long, check out whether you really need these programs:

·     Internet Explorer: This browser was mentioned above. It cannot be removed, but it can be ignored.

 

·     Microsoft Office: If you don't really need to use Microsoft Office specifically, there are plenty of free alternatives, such as Libre Office. Outlook can be replaced by Thunderbird. Like Internet Explorer, MS Office has deep roots and permissions in the operating system, and its macro programming is particularly prone to abuse. You should at least restrict this comprehensively if you do have to use this office suite.

 

·   Adobe Flash: a very popular target is the Flash plug-in for browsers. Fortunately, this technology is becoming increasingly obsolete. If possible, uninstall Flash. Only a few websites still need Flash for basic functions or even the entire display of the website, anyone who still operates such sites has missed the development of the last 5 years. Youtube and other portals now also use HTML 5 as standard and no longer use Flash.
Another advantage of not using Flash: Flash can use super cookies to track user information, which is much more powerful than normal cookies, but remain unnoticed by many, even if they otherwise value privacy and the like. Uninstalling Flash will also stop these super cookies.

 

·    Adobe Reader: The program for viewing PDFs remains popular, but it is far from the only program that can view PDFs. Since Adobe Reader is also often attacked, the use of an alternative such as Foxit Reader is already a step towards security.

 

·    Quick time: This video display technology from Apple has recently been discontinued by Apple and contains serious security holes that are already being exploited to install malware. You should urgently remove Quick time from your system if it exists. Like other application programs, it can also be uninstalled via the control panel.

 

·     Java: Java is a programming language that should not be confused with JavaScript. Java is useful, but if you aren't using applications that require Java, then you can do without Java. Since it has not been part of the Windows scope of delivery for a long time, you may not have it installed. If you do, but you don't need it, you can uninstall it in the Control Panel.

 

·     Windows: It comes as no surprise to regular readers of my blog that I advise against using Windows itself when there is no need to. Absolutely every other operating system is more secure. Not using Windows solves almost all of the security problems mentioned in this post in one fell swoop. As an Apple or Linux user, you can of course also become a victim of a phishing attack; but then the vulnerability is you, not your system.

 

If you implement all of this advice, you will achieve optimal, if not one hundred percent, protection of your Windows system. However, this does not relieve you of the responsibility to continue to be vigilant and to inform yourself as regularly as possible in the field of security. I hope that the contributions on this page will continue to provide you with valuable assistance.

 

WannaCry Attack - A Global Ransomware Attack

 WannaCry Attack - A Global Ransomware Attack

WannaCry was a global ransomware attack using the WannaCry crypto worm. It was developed for target computers with the Microsoft Windows operating system to encrypt data and request ransom payments in the cryptocurrency Bitcoin. The attack was stopped within a few days of its discovery with emergency patches published by Microsoft and the discovery of a “kill switch” that prevented the malware from spreading through infected computers. It is estimated that the attack affected more than 200,000 computers in 150 countries.


Timing of The Attack


At the beginning of the weekday on May 12, 2017, Adaptive Defence 360 ​​began detecting and blocking a large number of attacks that used the Eternal Blue vulnerability to deploy the WannaCry malware on computers. The attack reached practically every corner of the world.


It affected certainly vulnerable Microsoft Windows systems; all of their files and network drives they were connected to have been encrypted and other vulnerable Windows systems on the same network have been infected. The process ended with a $ 300 ransom note for decryption.


Also, the launch of vulnerable, not-yet-compromised computers triggered a second wave of attacks on the Monday following the outbreak. Many companies and institutions in China and Japan, including large corporations, ATMs, and hospitals, fell victim to this second wave.


Execution


The considerable strength of this attack campaign is related to the exploitation of a widespread Windows security vulnerability. The idea of ​​exploiting this loophole is attributed to the American National Security Agency (NSA). This is shown by documents that were leaked a month before the attack (in April 2017).


The infection did not require human intervention (such as opening an email or downloading it from the Internet) to gain access to a system. This allowed the attack to take place virtually simultaneously across the globe and without user intervention. So it was a massive attack with no human barriers.


The infection affected all connected Windows devices on the same network that had not been properly updated. Infecting a single computer could put the entire corporate network at risk.


Many traditional protection solutions that aim to stop malicious files cannot stop attacks that exploit these or other security vulnerabilities to infiltrate computers and networks. In the case of WannaCry, this resulted in the cyberattack spreading to a large number of countries and affecting a huge number of users (mainly in companies and public institutions).


How to Protect Yourself from WannaCry


Not all companies in the world that did not apply the security patch to fix the vulnerability that WannaCry exploited were victims of the attack. However, many companies had to stop all processes as a precaution until a security update had been implemented.


In this context, it can be concluded that a solution to this type of attack requires a holistic and structurally different approach than traditional cybersecurity products. That is exactly what Protegent360's Total Security offers. Thanks to the transparency provided by the Panda Security suite of products, as well as their ability to prevent, detect and fix problems, we were able to respond to the threat immediately and protect users' computers within minutes of the malware outbreak.

 

Tuesday, May 11, 2021

Advantage of the COVID-19 Vaccine Phishing by Cybercriminals

 Advantage of the COVID-19 Vaccine Phishing by Cybercriminals 

In recent weeks, Oxford University and the American pharmaceutical company Moderna Therapeutics, leading candidates for the race for the COVID-19 vaccine, have announced that they are making significant progress in their research - the modern pharmaceutical company has developed an experimental vaccine, tested on monkeys, that has allowed animals fight the virus, while Oxford University recently entered the final stage of trials that could result in a vaccine for COVID-19.


Investigators are once again alerting hackers and cyber attackers who have been following global pandemic advances closely, taking advantage of them to launch cyber threats, with emphasis on phishing campaigns. The Cyber Security Research team warns of the number of new domains related to the vaccine, which doubled between June and July. 


COVID-19 Vaccine-related Phishing Campaigns


Cyber ​​attackers have taken advantage of the latest advances in the vaccine for COVID-19 to launch a spam campaign that has the subject of an email “URGENT INFORMATION LETTER: COVID-19 NEW APPROVED VACCINES”. These emails also have attached Excel documents that, when downloaded, install malicious software capable of collecting information such as access data, user names, and respective passwords. 


Following the same logic, a phishing campaign was also detected that sent emails entitled "The effort for the coronavirus vaccine in the UK is developing inappropriately, causing more serious consequences for patients". This chain of emails contained a malicious link, now disabled according to Cyber Security researchers, used to direct users to a fake Canadian pharmaceutical website.


Weekly Cyber Attacks Related to Coronavirus


The overall number of cyber attacks remained high during July, as many countries around the world are either in the process of returning to “new normality” - or trying to do so. About attacks that are allied to the coronavirus theme, these have been decreasing considerably. In July, there was an average of almost 61,000 (60,962) attacks related to the pandemic, which represents a decrease of almost 50% compared to the weekly average of June, which stood at one in 130,000 weekly attacks.


E-mail, the Weak Point of Companies


More than 90% of attacks targeting companies start with a malicious email. Bearing in mind that attacks via e-mail usually involve the human factor, it is possible to conclude that the e-mail box of employees is the weakest point of an organization's security. Closing this gap requires optimized protection against multiple vectors: phishing, malware, data theft, and account appropriation. 

 

The widespread use of telework has increased the use of email boxes in the cloud and productivity applications. For this reason, Cyber Security researchers warn of the need to implement cybersecurity strategies that take into account basic pillars such as raising employee awareness of cybersecurity issues, the use of mobile device protection tools, and periodic software updates. Cyber Security's team of investigators also leaves some tips aimed at specific protection against attacks based on the sending of malicious emails: 

 

  • Use an email security solution that blocks sophisticated phishing attacks like BEC, to prevent them from reaching employees' inboxes.
  • Protect email traffic with an advanced security solution from a trusted provider. Open-source solutions or overly specialized vendors can do more harm than good.
  • Use two-factor authentication to check for any change in the account information or transfer instructions. 
  • Check the full email address in any message and be on the lookout for links that may contain misspellings or any domain name change. 
  • Do not share credentials or personal information via email. 
  • Regularly monitor financial accounts. 
  • Keep all software and systems up to date.

In this context, Protegent360 provides Total Security Software a software that provides companies with complete protection that constantly adapts to the frequent changes of cyber threats while guaranteeing administrators an easy management platform, reducing the Total Cost of Ownership and reinforcing cybersecurity.

 

Difference Between Endpoint Protection & Antivirus Software

  Difference Between Endpoint Protection &  Antivirus Software With regards to cybersecurity, there are parcels and bunches of confusing...